Replicating security configurations – Brocade Network Advisor SAN + IP User Manual v12.1.0 User Manual
Page 603
Brocade Network Advisor SAN + IP User Manual
541
53-1002949-01
Configuration repository management
14
Replicating security configurations
NOTE
This feature requires a Trial or Licensed version.
You can replicate an AD/LDAP Server, DCC, IP, RADIUS Server, or SCC security policy.
Select Configure > Configuration > Replicate > Security.
A wizard is launched to guide you through the process. The first step of the wizard, Overview,
displays. There are seven steps in the Replicate Switch Security Policy Configuration wizard:
1. Overview, which describes the wizard.
2. Configuration Type, which allows you to select the type of configuration you wish to replicate.
For more information about the fields and components of this step, refer to
3. Select Source Switch, which allows you to select the source device of the security policy
configuration you wish to replicate. For more information about the fields and components of
this step, refer to
4. Select Destination Switches, which allows you to select the destination devices. Only devices
that can accept the selected security policy configuration display. For more information about
the fields and components of this step, refer to
5. Validation, which lists the configuration settings that you can validate before you replicate. For
more information about the fields and components of this step, refer to
6. Summary, which lists the replication settings that successfully ran on all the selected
destination switches. For more information about the fields and components of this step, refer
to
To proceed to the next step in the wizard, click Next. To return to the previous screen, click Previous.
TABLE 65
Step 2. Configuration Type
Field/Component
Description
AD/LDAP Server option
Select to replicate the Active Directory/Lightweight Directory Access
Protocol (AD/LDAP) Server security policy. If both the source and
destination devices are running Fabric OS 7.1 or later, also replicates the
LDAP Role mapping configuration.
DCC Policy option
Select to replicate the Device Connection Control (DCC) security policy.
IP Policy option
Select to replicate the Internet Protocol (IP) Filter security policy.
RADIUS Server option
Select to replicate the Remote Authentication Dial-In User Service
(RADIUS) Server security policy.
SCC Policy option
Select to replicate the Switch Connections Control (SCC) security policy.
TABLE 66
Step 3. Select Source Switch
Field/Component
Description
Available Switches table
Lists the devices from which you can select to replicate a security policy
Fabric Name
The name of the fabric that is associated with the selected available
switch.
Switch Name
The name of the source switch to be replicated.